Results 1 to 10 of about 53,525 (364)

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu
exaly   +4 more sources

Image vaccine against steganography in encrypted domain [PDF]

open access: yesScientific Reports
This paper investigates on the defense against steganography, and the overall purpose of the study is to design a satisfactory defense scheme in encrypted domain.
Xinran Li, Zichi Wang
doaj   +2 more sources

Retransmission Steganography Applied [PDF]

open access: green2010 International Conference on Multimedia Information Networking and Security, 2010
This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field.
Wojciech Mazurczyk   +2 more
openalex   +4 more sources

Steganographically Encoded Data [PDF]

open access: yesInformatică economică, 2007
Steganography is the art of hiding information in ways that prevent its detection. Though steganography is an ancient craft, the onset of computer technology has given it new life.
Adrian VASILESCU
doaj   +2 more sources

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Baoxia Li, Daidou Guo, Mengxiao Gou
exaly   +3 more sources

Eigenfaces-Based Steganography [PDF]

open access: yesEntropy, 2021
In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details).
Tomasz Hachaj   +2 more
openaire   +4 more sources

Digital steganography model and its formal description

open access: yes网络与信息安全学报, 2020
In order to make the research of digital steganography model develop synchronously with steganography research, three digital steganography models from general to specific are proposed, and each model was formalized.
SONG Haitao, TANG Guangming, SUN Yifeng, WANG Yang
doaj   +3 more sources

Random Matrix Transformation and Its Application in Image Hiding

open access: yesSensors, 2023
Image coding technology has become an indispensable technology in the field of modern information. With the vigorous development of the big data era, information security has received more attention.
Jijun Wang, Fun Soo Tan, Yi Yuan
doaj   +1 more source

ARPNetSteg: Network Steganography Using Address Resolution Protocol [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of
Punam Bedi, Arti Dua
doaj   +1 more source

Image hiding by using spatial domain steganography

open access: yesWasit Journal of Computer and Mathematics Science, 2023
This article provides an overview of steganography and its use for hiding images in other images. Steganography is a technique that allows users to hide information in plain sight, making it difficult for unauthorized parties to detect or access the ...
Ghazali Bin Sulong, Maria A.Wimmer
doaj   +1 more source

Home - About - Disclaimer - Privacy